From: mrunkel@steph.admin.umass.edu (Marc A. Runkel)
Subject: comp.dcom.lans.ethernet FAQ (Frequently Asked Questions)
Date: 13 Feb 1995 17:32:24 GMT
Message-ID: <3ho538$gts@nic.umass.edu>
Summary: The list of Frequently Asked Questions (and their answers)
         about Ethernet and 802.3 networking.  A good source of info
         on the lower-layer Ethernet standards and issues.

Archive-name: LANs/ethernet.faq
Version: v2.12
Posting-Frequency: monthly
Ethernet Network Questions and Answers
Summarized from UseNet group comp.dcom.lans.ethernet
Version 2.12 of 13 December 1994
Sections:
  1. Introduction, contributors, how to contribute to the FAQ and network etiquette.
  2. General information about Ethernet and standards.
  3. Ethernet Cabling Information.
  4. Ethernet Devices and Components.
  5. Errors and Related Terms.
  6. Testing and Troubleshooting.
  7. Additional Information.
01.01Q: What is this document?
     A: This  is  the official FAQ (Frequently Asked Questions) listing for
        UseNet newsgroup comp.dcom.lans.ethernet.   It is intended to  be a
        reference  to the most commonly asked questions and basic  informa-
        tion about Ethernet.

01.02Q: How is this document made available?
     A: This FAQ  is posted  monthly  to newsgroup comp.dcom.lans.ethernet,
        comp.answers  and  news.answers on UseNet.   You can  also retrieve
        this file via anonymous FTP from steph.admin.umass.edu 
        (128.119.200.10) in pub/faqs as file ethernet.faq

01.03Q: Who maintains this list?
     A: This  list  is  currently  maintained by Marc Runkel.  My preferred
        mail  address is mrunkel@rich.admin.umass.edu,  and  I  would greatly
        appreciate  it  if  you  could  use  a  Subject:  line  that starts
        "Ethernet FAQ".

01.04Q: Where does all this information come from?
     A: The questions and answers are  mostly  summarized from  the  UseNet
        newsgroup comp.dcom.lans.ethernet, many of  which are  derived from
        various  IEEE,  ISO  and   EIA/TIA  documents.   Specifically,  the
        following persons have contributed  to this FAQ.   Their  knowledge
        and experience is gratefully acknowledged.

            Doug Barr          barr@spot.colorado.edu
            John Breeden       johnbr@master.cna.tek.com
            TP Brisco          brisco@rutgers.edu
            Peter Desnoyers    peterd@merlin.dev.cdx.mot.com
            Daniel Huber       danielh@hpber199.swiss.hp.com
            Bob Jaques         jaques@drbob.corp.sgi.com
            Paul Joslin        pjoslin@mbvlab.wpafb.af.mil
            Dave Kapalko       medik@attme.att.com
            Rich Lawrence      rich@grebyn.com
            Nick Hennenfent    nicholas@cton.com
            Ray Hunter         rhunter@esoc.BITNET
            Mark Medici        medici@gandalf.rutgers.edu
            Dave Mitton        ???@dec.com?
            Rich Seifert       seifert@netcom.com
            Charles Spurgeon   C.Spurgeon@utexas.edu
	    Andras Salamon     andras@is.co.za

         (Note: If you have contributed something to this FAQ but your name
                is not listed  above,  please take  no offense.  There  was
                some loss of  information in this  file a while back.  Just
                mail the current FAQ maintainer  your preferred  name  and
                mail address, and which section(s) you contributed).

01.05Q: How can I submit new contributions or corrections to the FAQ?
     A: New contributions, suggestions and corrections should  be mailed to
        the  current  FAQ  maintainer,  who is  listed in  Q&A 01.03 above.
        However,  you should note that  if you are  submitting a correction
        you must provide both  the  old  and suggested new text -- messages
        to the effect of "this is wrong, fix it" will be ignored.

01.06Q: Are there any restrictions on the distribution of this FAQ?
     A: You  may  freely distribute  this  document for non-commercial
        purposes as  long as the contents remain  unchanged (including
        credits)  and  you  do not  gain  any  direct profits from the
        distribution.

01.07Q: Are there any guidelines regarding postings on this newsgroup?
     A: The standard UseNet guidelines apply to this newsgroup.  Explaining
        these guidelines in detail requires a FAQ of  its own.  If you  are
        not familiar with standard network etiquette, you should review the
        documents posted regularly in the newsgroup  news.announce.newuser.
        A quick summary is:

        *  Never forget that the person on the other side is human
        *  Be careful what you say about others
        *  Be brief
        *  Your postings reflect upon you; be proud of them
        *  Use descriptive titles
        *  Think about your audience
        *  Be careful with humor and sarcasm
        *  Only post a message once
        *  Summarize what you are following up
        *  Use mail, don't post a follow-up unless it's of value to many
        *  Read all follow-ups and don't repeat what has already been said
        *  Double-check follow-up newsgroups and distributions.
        *  Be careful about copyrights and licenses
        *  Cite appropriate references
        *  When summarizing, summarize
        *  Spelling flames considered harmful
        *  Don't overdo signatures
        *  Limit line length and avoid control characters
        *  Identify any financial interests related to your posting

01.08Q: Are the vendors and/or models of equipment listed in this FAQ the
        only or best suited for the application described?
     A: Not  necessarily.  This document does not attempt to rate equipment
        from different manufacturers, and does not endorse nor specifically
        support any one vendor's product over another.  Any references to a
        specific vendor or product is implicitly used as an example of  all
        like devices.


02.01Q: What is Ethernet?
     A: Ethernet is a type of network cabling and signalling specifications
        (OSI  Model  layers  1 [physical]  and  2  [data link])  originally
        developed by Xerox in  the late 1970.   In  1980, Digital Equipment
        Corp.  (DEC), Intel and Xerox (the origin of  the  term DIX,  as in
        DEC/Intel/Xerox)  began joint promotion  of this baseband,  CSMA/CD
        computer communications network over coaxial cabling, and published
        the "Blue Book Standard" for Ethernet Version 1.  This standard was
        later enhanced, and in 1985 Ethernet II was released.

        The  IEEE's  (Institute of  Electrical  and Electronics Engineers')
        Project 802 then  (after considerable debate) used Ethernet Version
        2  as the basis for the  802.3 CSMA/CD network  standard.  The IEEE
        802.3 standard  is generally interchangeable with Ethernet II, with
        the  greatest  difference  being the  construction of  the  network
        packet header.

        A complete description of all Ethernet  specifications is far  out-
        side the  scope of this document.  If this area interests you,  you
        are  encouraged  to obtain  (hopefully legally) copies of the  IEEE
        802.3 documents, and perhaps the ISO 8802-3 documents as well.

02.03Q: What is an 802.3 network?
     A: That's  IEEE-ish  for Ethernet, but  with a few small  differences.
        The  physical  layer  specifications  are  identical  (though   DIX
        Ethernet never  specified standards for UTP and Fiber-Optic  media)
        and the MAC sublayer  are somewhat different.  See  "What is Ether-
        net for more info.

02.02Q: What is CSMA/CD?
     A: CSMA/CD is the media access  control mechanism used by Ethernet and
        802.3 networks; in other words, it determines how a  packet of data
        is placed on the wire.   CSMA/CD stands for "Carrier Sense Multiple
        Access, with Collision Detection".  Before  an Ethernet device puts
        a  packet "on  the wire",  it listens to find if another device  is
        already transmitting.  Once the device finds the wire is clear,  it
        starts sending the  packet while  also listening to hear if another
        device  started  sending  at  the  same  time (which  is  called  a
        collision).  Refer  to the  Q&A  on collisions for more  info about
        this phenomena.

02.03Q: What is a baseband network?
     A: A baseband  network  is  one  that provides  a  single  channel for
        communciations accross the  physical medium (e.g., cable),  so only
        one device  can transmit at a time.  Devices on a baseband network,
        such  as Ethernet, are permitted to use all the available bandwidth
        for  transmission, and the signals they transmit do not  need to be
        multiplexed onto a carrier frequency.  An analogy is a single phone
        line such  as you usually  have  to your house: Only one person can
        talk at a time--if more than one  person wants to talk everyone has
        to take turns.

02.04Q: Ok, so what is a broadband network?
     A: Simplisticly,  it is  the  opposite  of  a baseband network.   With
        broadband, the physical  cabling is virtually  divided into several
        different channels, each with  its own  unique  carrier  frequency,
        using  a technique called "frequency  division  modulation".  These
        different frequencies are  multiplexed  onto the network cabling in
        such a way to allow multiple  simultaneous "conversations"  to take
        place.  The  effect is  similar to having several virtual  networks
        traversing a single piece of wire.  Network devices "tuned" to  one
        frequency  can't  hear  the  "signal"  on  other  frequencies,  and
        visa-versa.   Cable-TV  is  an  example  of  a  broadband  network:
        multiple  conversations  (channels)  are transmitted simultaneously
        over a single  cable; you  pick  which one you want to listen to by
        selecting one of the frequencies being broadcast.

02.05Q: What is an OSI Model?
     A:  The  Open  Systems  Interconnect (OSI)  reference model is the ISO
        (International  Standards Organization) structure for  the  "ideal"
        network  architecture.  This Model outlines seven areas, or layers,
        for the network.  These layers are (from highest to lowest):

          7.) Applications:  Where the  user  applications  software  lies.
              Such  issues as  file  access and transfer,  virtual terminal
              emulation,   interprocess  communication  and  the  like  are
              handled here.
          6.) Presentation:  Differences in data  representation are  dealt
              with at this level.  For example, UNIX-style line endings (CR
              only) might be converted to  MS-DOS style  (CRLF), or EBCIDIC
              to ASCII character sets.
          5.) Session:  Communications between  applications  across a net-
              work  is  controlled  at  the  session  layer.   Testing  for
              out-of-sequence  packets  and handling two-way  communication
              are handled here.
          4.) Transport: Makes sure  the lower three layers are doing their
              job  correctly,  and  provides a  transparent,  logical  data
              stream between the end user  and the network  service s/he is
              using.   This  is the lower layer  that provides  local  user
              services.
          3.) Network: This layer makes certain that a packet sent from one
              device  to another actually gets there in a reasonable period
              of time.  Routing and flow control are performed  here.  This
              is the lowest layer of the OSI model that can remain ignorant
              of the physical network.
          2.) Data Link: This layer deals with getting data packets on  and
              off   the   wire,   error  detection   and   correction   and
              retransmission.  This  layer  is generally  broken  into  two
              sub-layers: The LLC (Logical Link Control) on the upper half,
              which does  the error checking,  and  the MAC (Medium  Access
              Control) on the lower half, which deals with getting the data
              on and off the wire.
          1.) Physical: The nuts and bolts layer.  Here is where the cable,
              connector and signaling specifications are defined.

        There is also the undocumented but widely recognized  ninth network
        layer:

          9.) Bozone (a.k.a., loose nut behind the wheel): The user sitting
              at and using (or abusing,  as  the case may be) the networked
              device.  All the error detection/correction algorithms in the
              world cannot protect your network from the problems initiated
              at the Bozone layer.

02.06Q: What does an ethernet packet look like?  
     A. See the information below, as described  in the National  databook.
        The ethernet packet preamble is normally generated by  the chipset.
        Software  is  responsible  for  the  destiantion   address,  source
        address, type, and  data.  The chips normally will append the frame
        check sequence.

          +------------+
          |            | Preamble -
          |   62 bits  |  A series of alternating 1's and 0's used by the
          |            |  ethernet receiver to acquire bit synchronization.
          |            |  This is generated by the chip.
          +------------+
          |            |  Start Of Frame Delimiter -
          |    2 bits  |  Two consecutive 1 bits used to acquire byte
          |            |  alignment. This is generated by the chip.
          +------------+
          +------------+
          |            |  Destination Ethernet Address -
          |    6 bytes |  Address of the intended receiver.
          |            |  The broadcast address is all 1's.
          +------------+
          |            |  Source Ethernet Address -
          |    6 bytes |  The unique ethernet address of the sending
          |            |  station. 
          +------------+
          |            |  Length or Type field -
          |    2 bytes |  For IEEE 802.3 this is the number of bytes of
          |            |  data.  For Ethernet I&II this is the type of
          |            |  packet.  Types codes are > 1500 to allow both to
          |            |  coexist.  The type code for IP packets is 0x800.
          +------------+
          |   46 bytes |  Data -
          |      to    |  Short packets must be padded to 46 bytes.
          | 1500 bytes |
          +------------+
          +------------+
          |            |  Frame Check Sequence -
          |    4 bytes |  The FCS is a 32 bit CRC calculated using
          |            |  the AUTODIN II polynomial.
          |            |  This field is normally generated by the chip.
          +------------+

        The shortest packet is: 6 + 6 + 2 + 46 = 60 bytes
        The longest packet is: 6 + 6 + 2 + 1500 = 1514 bytes

02.07Q: What  is the difference between  an Ethernet frame  and a IEEE802.3
        frame?  Why are there two types?  Why is there a difference?
     A: Ethernet was invented at Xerox  Palo Alto Research Center and later
        became  an  international  standard.   IEEE  handled  making  it  a
        standard; and their  specifications are slightly different from the
        original Xerox ones.   Hence,  two different types.  802.3 uses the
        802.2 LLC to distinguish among multiple clients, and has a "LENGTH"
        field where Ethernet has a 2-byte "TYPE" field to distinguish among
        multiple client protocols.

        TCP/IP and  DECnet (and others) use  Ethernet_II framing, which  is
        that which Xerox/PARC originated.

02.08Q: What is SNAP
     A:  Sub-Network Access Protocol,  an extention to the  original  802.2
        data link level format.  (SNAP is described in  IEEE 802-1990)  The
        802.2  data link format replaced the Ethernet Protocol Type concept
        with  two   8  bit   fields;   Source  SAP,  and  Destination  SAP.
        Unfortunately that causes problems with migration of protocols, and
        the lack  of SAP space  that is available.  So one SAP as allocated
        for this scheme which greatly expands the available protocol space.
        When using  the  SNAP SAP  the first 5  bytes of data are used as a
        protocol ID.  The first 3 bytes should be a  value allocated to you
        as a vendor id, the same as you get for Source address values.  The
        is called the OUI (Organizationally  Unique ID) The  second 2 bytes
        is a protocol type.

        Note that this is 802.2 and applies across all 802 LAN media types.

        For translation bridging, there is a convention, if you set the OUI
        to zero, you are representing a mapped Ethernet frame.  So  that  a
        bridge will translate such a frame back  into Ethernet  format, and
        not into an 802.3 frame format.

        802.2 SNAP frame:

            +-------+------+------+------+-------+------+------+
            | MAC   | DSAP | SSAP |  UI  |  OUI  | Type | data |
            | Header| 0xAA | 0xAA | 0x03 | 3bytes|2bytes|      |
            +-------+------+------+------+-------+------+------+

        This  will  appear the  same  on all 802 compliant  LAN  media.  On
        802.3, there will be a Length field between the SA and the DSAP but
        not on 802.5 or FDDI.

02.09Q: Where  can I find  out which  Protocols  use  which  Ethernet  type
        numbers?
     A: Look at IETF RFC-1700 - Assigned Numbers RFC.

02.10Q: What is a MAC address?
     A: It is  the unique hexadecimal serial number assigned to each Ether-
        net  network device to identify it  on  the network.  With Ethernet
        devices  (as  with  most other  network  types),  this  address  is
        permanently set at  the time of manufacturer, though it can usually
        be changed  through  software (though this is  generally a Very Bad
        Thing to do).

02.11Q: Why must the MAC address to be unique?
     A: Each card  has  a  unique MAC address,  so  that it will be able to
        exclusively  grab  packets  off the wire  meant  for  it.   If  MAC
        addresses are not unique,  there is no  way  to distinguish between
        two  stations.  Devices on the network  watch  network  traffic and
        look for their own MAC address in each packet to determine  whether
        they should decode  it  or  not.   Special circumstances exist  for
        broadcasting to every device.

02.12Q: Is there a special numbering scheme for MAC addresses?
     A: The  MAC addresses  are exactly 6  bytes in length, and are usually
        written  in  hexadecimal  as  12:34:56:78:90:AB (the  colons may be
        omitted,  but generally make  the  address  more  readable).   Each
        manufacturer of Ethernet devices applies for a certain range of MAC
        addresses  they can use.   The first  three  bytes  of the  address
        determine the manufacturer.   RFC-1700 (available  via  FTP)  lists
        some of the manufacturer-assigned MAC addresses.  A more up-to-date
        listing  of  vendor  MAC   address   assignments  is  available  on
        ftp.lcs.mit.edu in pub/map/Ethernet-codes.

02.13Q: What is a preamble ?
     A: A seven octet  field of  alternating one  and zero binary bits sent
        prior to each frame to allow the  PLS circuitry to reach its steady
        state synchronization with received  frame timing. (802.3 standard,
        page 24,42).

02.14Q: What is a Start Frame Delimiter (SFD)?
     A: A binary  sequence of '10101011' immediately following the preamble
        and indicating  the  beginning of a frame.   (802.3  standard, page
        24).

02.15Q: What does CRC mean?
     A: Cyclical Redundancy Check  -  A method  of  detecting  errors in  a
        message by performing a mathematical calculation on the bits in the
        message and then sending the results  of the calculation along with
        the   message.   The  receiving  work-station  performs   the  same
        calculation on the message  data  as it receives it and then checks
        the results against those  transmitted  at the end of  the message.
        If the results don't match, the receiving  end asks the sending end
        to send again.

02.13Q: What is a broadcast address?
     A: The unique  address that identifies a packet as  appropriate to all
        receiveing stations.  In 802.3 any address in which the second byte
        is an odd number. (1,3,...F).

02.14Q: What exactly do 10Base5, 10BaseT, 10Base2, 10Broad36, etc mean?
     A: These are  the IEEE  names  for  the different  physical  types  of
        Ethernet.   The  "10" stands for  signalling  speed: 10MHz.  "Base"
        means  Baseband,  "broad"  means  broadband.  Initially,  the  last
        section as intended to indicate the maximum length of an unrepeated
        cable segment in hundreds  of meters.  This convention was modified
        with the introduction of 10BaseT, where  the T  means twisted pair,
        and 10BaseF  where  the F  means fiber  (see  the following Q&A for
        specifics).  This actually comes from the IEEE committee number for
        that media.

        In actual practice:

            10Base2   Is 10MHz Ethernet running over  thin, 50 Ohm baseband
                      coaxial cable.  10Base2 is also commonly referred to
                      as thin-Ethernet or Cheapernet.
            10Base5   Is 10MHz  Ethernet running over  standard  (thick) 50
                      Ohm baseband coaxial cabling.
            10BaseF   Is 10MHz Ethernet running over fiber-optic cabling.
            10BaseT   Is 10MHz Ethernet  running  over unshielded, twisted-
                      pair cabling.
            10Broad36 Is 10MHz Ethernet running through a broadband cable.

02.15Q: What does FOIRL mean?
     A: Fiber Optic Inter Repeater  Link. A "IEEE 802 standard"  worked out
        between many vendors some  time ago for carrying  Ethernet  signals
        across  long distances  via fiber optic cable.   It has since  been
        adapted to  other  applications  besides  connecting  segments  via
        repeaters  (you  can  get  FOIRL  cards  for  PCs).   It  has  been
        superseded by the larger 10BaseF standard.

02.16Q: What is LattisNet?
     A: LattisNet is a pre-10BaseT quasi-standard for running Ethernet over
        twisted-pair cabling.   It was developed by Synoptics,  and several
        other vendors made compatible equipment for a while.  LattisNet  is
        not compatible with 10BaseT,  but you can  have LattisNet  hubs and
        10BaseT hubs  in the  same  hub  chassis  or  connected to the same
        network backbone.  The primary difference is that 10BaseT synchron-
        izes the signals at  the sending  end, while LattisNet syncrhonizes
        at the receiving end.

02.17Q: What is StarLAN-10?
     A: StarLAN-10 is AT&T's variety of Ethernet over twisted-pair cabling.
        Older StarLAN-10  is not  100% 10BaseT  compliant, as  it does  not
        provide  link   integrity  to   the  AUI.   However,  many  10BaseT
        interfaces  can   be  configured  to  work  with  StarLAN-10  hubs,
        alongside  StarLAN-10  NICs.  Beware,  though,  that  the  original
        StarLAN-10 is NOT in any  way  compatible with 10BaseT, and  worse,
        there seems to be no way to tell  other than  trying it to see what
        happens.

        The current StarLAN  products supported by AT&T/NCR are fully 802.3
        compliant. This includes the  SmartHUB  model E, SmartHUB  model B,
        SmartHUB XE, and the other fiber and wire SmartHUB models.


03.01Q: What is coax?
     A: Coaxial cable (coax)  is a  metallic electrical  cable used  for RF
        (radio  frequency) and  certain data  communications  transmission.
        The cable is constructed with a  single  solid  or stranded  center
        conductor that is surrounded by the dielectric layer, an insulating
        material of  constant thickness and high resistance.  A  conducting
        layer of aluminum foil, metallic braid  or a combination of the two
        encompass  the  dielectric  and  act  as  both   a  shield  against
        interference  (to or  from the  center conductor) and as the return
        ground for the cable.  Finally, an  overall  insulating layer forms
        the  outer  jacket  of  the  cable.   Coaxial  cable  is  generally
        superior  in   high-frequency  applications  such  as   networking.
        However, for shorter distances (up to 100 meters), UTP or STP cable
        is generally  just  as reliable when using  differential modulation
        techniques (such as with 10BaseT).

        There are three  types of RG-58 cable, as far as I can tell.  There
        are probably other  subtle differences, but for  10BASE2, impedance
        and  velocity of propagation are the  important  ones.   The  table
        below summarizes:

		Cable		Impedance		Velocity
                ----------      ----------              --------------
		RG-58A/U	50 ohms			.66 or .78
		RG-58C/U	50 ohms			.66
		RG-58/U		53.5 ohms		.66 or .695

03.02Q: What is UTP, STP?
     A: Twisted pair cables.  UTP is for  UNshielded,  twisted pair,  while
        STP  is  for  SHIELDED,  twisted  pair.   UTP  is what's  typically
        installed  by  phone companies (though  this is often not  of  high
        enough quality  for  high- speed network  use)  and is what 10BaseT
        Ethernet runs over.  UTP  is graded according  to its data carrying
        ability  (e.g.,  Level 3,  Level  4, Level  5).   10BaseT  Ethernet
        requires  at  least  Level  3 cable.  Many  sites now install  only
        Level-5  UTP,  even  though  level  4 is more  than  sufficient for
        10BaseT, because of the greater likelihood that emerging high-speed
        standards will require cable with better bandwidth capabilities.

        STP is typically used for Token-Ring networks, where it is commonly
        referred  to  IBM Type 1 (or  2, 3, 6,  8,  etc); however there are
        several  manufacturers of  Ethernet equipment and  interfaces  that
        support Ethernet  over STP.  Nevertheless, Ethernet over STP is not
        officially  defined in any  standards.  While there is a good level
        of interoperability with Ethernet over  STP,  (Lattisnet, developed
        by  Synoptics,  is the recognized de facto standard in this  area),
        one  should consider the  long-term  availability and cost of  this
        non-standard scheme before planning new networks around it.

03.03Q: Are there any restrictions on how Ethernet is cabled?
     A: Yes,  there are  many, and  they vary according to the media  used.
        First of all, there are distance limitations:

            10Base2   limited to 185  meters (607 ft)  per unrepeated cable
                      segment.
            10Base5   limited to 500 meters (1,640 ft) per unrepeated cable
                      segment.
            10BaseF   depends on the  signaling technology  and medium used
                      but can go up to 2KM.
            10BaseT   generally accepted to have a maximum run of 100-150M,
                      but  is really  based on signal  loss in Db's (11.5db
                      maximum loss source to destination).
            10Broad36 limited to 3,600 meters (almost 2.25 miles).

        Then there are limitations on the number  of  repeaters  and  cable
        segments allowed between  any two stations on  the  network.  There
        are two different ways of looking at the same rules:

        1. The Ethernet way:

            A remote  repeater pair  (with  an  intermediate point-to-point
            link) is counted  as  a single  repeater  (IEEE  calls  it  two
            repeaters).  You cannot  put any stations on the point to point
            link (by definition!),  and there can be two repeaters  in  the
            path between any pair  of stations.   This  seems simpler to me
            than the IEEE terminology, and is equivalent.

        2. The IEEE way:

            There may be no more than five (5)  repeated segments, nor more
            than four (4) repeaters  between any two Ethernet stations; and
            of the  five cable segments, only three (3)  may be  populated.
            This  is  referred  to as  the  "5-4-3"  rule  (5  segments,  4
            repeaters, 3 populated segments).

        It can  really get  messy when  you start cascading through 10BaseT
        hubs, which  are repeaters unto themselves.   Just try to remember,
        that  any  possible  path  between   two  network  devices  on   an
        unbridged/unrouted  network  cannot   pass   through  more  than  4
        repeaters or hubs, nor more than 3 populated cable segments.

        Finally, 10Base2  is limited to a maximum of 30 network devices per
        unrepeated network segment with a minimum distance of  0.5m (1.5ft)
        between T-connectors.   10Base5  is  limited to a  maximum  of  100
        network devices per unrepeated segment, with a minimum distance  of
        2.5m  (8.2ft)  between taps/T's  (usually  indicated  by  a  marker
        stamped on the cable  itself every 2.5m).  10BaseT and 10BaseF  are
        star-wired,  so there  is no  minimum  distance requirement between
        devices, since  devices  cannot  be connected  serially.   You  can
        install  up to the  Ethernet maximum of  1024 stations per  network
        with both 10BaseT and 10BaseF.
   

03.04Q: Can I mix 10Base2 and 10Base5 cabling on a single segment?
     A: It  is not "legal", but  the network police will not read  you your
        rights and drag  you away.   Ideally, you should use a repeater (or
        bridge,  router, etc...)   between  the  different  cabling  types.
        However, in reality, it  will work fine, as  long  as  none  of the
        other network parameters (lengths, numbers of stations,  repeaters,
        etc) are near the limit of the specification.

03.05Q: What about wireless Ethernets? Are there any?
     A: Yes, and no.  Many  vendors  offer equipment for  Ethernet across a
        variety  of   unbounded,  or wireless,  connections  using  lasers,
        microwaves, and spread-spectrum radio transmissions.  However, none
        of these  methods are organized by  any standards  body, so  it  is
        unlikely  to find equipment  from any two  different  manufacturers
        that work together.

03.06Q: When should I choose 10BaseT, when 10Base2 (or others)?
     A: The  specific environment and  application must be considered  when
        selecting  your  media  type.   However,  there  are  some  general
        rules-of-thumb that you can consider:

        Avoid using copper between buildings.   The electrical disturbances
        caused by  lightning, as well as naturally occurring differences in
        ground potential over distance,  can very quickly and easily  cause
        considerable   damage  to   equipment  and  people.    The  use  of
        fiber-optic cabling between buildings eliminates network cabling as
        a safety risk.  There are also various wireless media available for
        inter-building   links,  such  as  laser,  spread-spectrum  RF  and
        microwave.  However, wireless media is much more expensive and less
        reliable than fiber-optic, and should only be considered when it is
        impossible to get right-of-way for fiber-optic cable.

        10Base2 (thin Ethernet or Cheapernet) is the least expensive way to
        cable an Ethernet network.   However, the price difference  between
        10Base2 and  10BaseT  (Ethernet  over  UTP) is rapidly diminishing.
        Still,  for small, budget-conscious installations, 10Base2  is  the
        most economical topology.  The disadvantages of 10Base2 is that any
        break in the cable or poor connection will bring the entire network
        down,  and  you  need repeaters  if  you have  more than 30 devices
        connected  to the  network or the  cable length  exceeds 185 meters
        (607 feet).

        10Base5 is generally  used as a low-cost alternative to fiber-optic
        media for use as a backbone segment within a single building.  It's
        extended  length (500m or  1640ft),  higher  attached  device count
        (100) and better noise resistance make 10Base5 well  suited for use
        as  a network trunk for one or more floors in a building.  However,
        the  high  cost  of connecting  each  device (in  addition  to  the
        interface,  you also need  an external transceiver, or  MAU, and an
        AUI cable) makes 10Base5 too expensive  for most LAN installations,
        and like 10Base2, a single break or bad connection in the cable can
        bring the entire network down.

        10BaseT is the most  flexible topology  for LANs,  and is generally
        the  best choice for most  network installations.  10BaseT hubs, or
        multi-hub  concentrators,  are  typically  installed  in a  central
        location to the user  community, and inexpensive UTP cabling is run
        to each network device (which may be 100m, or 330ft, from the hub).
        The signalling technology is very  reliable, even in somewhat noisy
        environments, and 10BaseT  hubs  will usually detect  many  network
        error conditions and automatically shut-down the  offending port(s)
        without affecting the  rest of the  network (unless, of course, the
        offending port was  your  server, shared printer, or router to  the
        rest of the world).  While  the  hardware  is  more expensive  than
        10Base2, the cabling is cheaper and requires less skill to install,
        making  10BaseT  installation  costs   only  slightly  higher  than
        10Base2.  The  flexibility and  reliability  more  than offset  the
        marginally higher price.

        10BaseF, and  its  predecessor, FOIRL,  are  the  only  recommended
        topologies  for  inter-building  links.  However,  they need not be
        limited to  this  role.  10BaseF  can also be run  to  the desktop,
        though  the  cost  is  prohibitively  high  in  all  but  the  most
        specialized environments  (generally, extremely noisy manufacturing
        facilities,   or  very   security-conscious  installations).   More
        commonly, FOIRL (and now, 10BaseF) is used inside buildings to form
        backbone networks and to connect wiring closets together.


03.07Q: What are the advantages/disadvantages of a star like cabling?
     A: Old  style Ethernet  bus  wiring  (ie, taking the  cable  from  one
        machine to the next, and then to the  next, etc) is  prone to cable
        failure and quickly  consumes allowed  distances  due to  aesthetic
        wiring needs. If  the wiring connection is broken at any point, the
        entire network  (segment)  fails -  and the much greater number  of
        connections increases the probability of a failure or break. On the
        other  hand, it's  pretty easy to do for  a  layman and may involve
        less actual wiring for small segments.

        Star  wiring eliminates the single  point  of failure  of  a common
        wire.   A  central  hub  has many  connections  that radiate out to
        hosts, if one of these hosts connections  fails  it usually doesn't
        affect  the others.  Obviously, however, the hub becomes a  central
        point  of  failure  itself, but studies show  a quality hub is less
        likely to fail before a heavily used strand of coax.

        There are a bunch of other reasons hubs are desirable, but  this is
        the biggie.

03.08Q: Is there an official "standard" punch down scheme for 10BaseT?
     A: Get a copy  of EIA/TIA-568, it  covers  all of  that sort of stuff:
        horizontal, vertical, connectors, patch cords, cross-connects, etc.

03.09Q: Is it safe to run Unshield Twisted Pair next to power cable?
     A: According to EIA/TIA-569, the standard wiring practices for running
        data cabling and companion to the above referenced EIA/TIA-568, you
        should not run data cable parallel  to power  cables.  However,  in
        reality, this  should  not  be a  problem  with  networks  such  as
        10BaseT.   10BaseT uses differential  signalling  to pick the  data
        signals off the wire.   Since any interference  from  nearby  power
        lines will usually affect  all  pairs equally, anything that is not
        canceled-out by the  twists  in  the UTP should  be ignored by  the
        receiving network interface.

03.10Q: Can I make a cable to connect the AUI ports of two devices directly
        to each other?
     A: Yes and  no.  You can make the  equivalent of a null modem cable by
        connecting a two-pair, twisted  pair cable  connecting pins 3/10 at
        each end to  pins 5/12 (respectively)  at the other.  This connects
        transmit-to receive (null modem).   However, this will probably NOT
        work with "standard" software because:

          - There is no  collision detect.  If  a collision  occurs neither
            device will back-off or and retry.
          - There  is  no  loopback  (stations   will  not  hear  their own
            transmissions which may cause diagnostics failures).
          - There is no heartbeat (SQE  test)  provided,  which  may  cause
            diagnostic failure.

        If you want to use standard software, buy some transceivers. An AUI
        null-modem  will work  for  a  laboratory, test  environment  under
        certain conditions.

03.11Q: Can  I  connect  the  10BaseT  interface  of  two devices  directly
        together, without using a hub?
     A: Yes, but  not more  than  2 devices, and you  also  need  a special
        jumper cable between the two 10BaseT ports:

          RJ45 pin                   RJ45 pin
          ========                   ========
             1 <--[TX+]--------[RX+]--> 3
             2 <--[TX-]--------[RX-]--> 6
             3 <--[RX+]--------[TX+]--> 1
             6 <--[RX-]--------[TX-]--> 2

03.12Q: Does my Ethernet coax have to be grounded?  How?
     A: Yes and  no.  The 10Base2 spec says the coax MAY be grounded at one
        and only  one point, while  the 10Base5 spec says the coax SHALL be
        grounded at one and only one point.

        Grounding  your coax  is  generally a  good  idea; it allows static
        electricity  to  bleed  off and,  supposedly,  makes  for  a  safer
        installation.  Further,  many local  electrical codes  will require
        your network cabling to be grounded at some point.  However, I have
        personally  seen many  Ethernet networks  work with  absolutely  NO
        ground  on the segment, and even  a few  unreliable segments become
        reliable when the one and only ground  was removed.  I'm not saying
        you  should not ground  your  networks  --  you  should  absolutely
        install cabling according to your electrical codes.

        On the other hand, if you do ground your cable, make sure you do so
        only  at  one point.  Multiple grounds on an Ethernet segment  will
        not  only cause  network errors,  but also risk damage to equipment
        and  injury to people.

        If you have a repeater on one end of the segment, this will usually
        automatically ground that end of the segment (you may want to check
        the repeater documentation and configuration  to assure this is the
        case -- most repeaters  can be set-up to NOT ground).  If you don't
        have  a repeater, you  can  get terminating resistors  with  ground
        straps attached.


04.01Q: What is a "segment"?
     A: A  piece of network wire bounded by bridges,  routers, repeaters or
        terminators.

04.02Q: What is a "subnet"?
     A: Another overloaded  term. It can  mean, depending on  the usage,  a
        segment, a set of machines  grouped together by a specific protocol
        feature  (note  that  these machines do not have to be on  the same
        segment, but they could be) or a big  nylon  thing used  to capture
        enemy subs.

04.03Q: What is a fan-out? Is this device still used?
     A: Fanout (a.k.a. transceiver  multiplexor,  a.k.a.   multiport trans-
        ceiver,  a.k.a.  DELNI)  allows  multiple stations to  connect to a
        single  transceiver  or transceiver-like device.   They  are  still
        widely used.

04.04Q: What means "AUI"?
     A: Attachment Unit Interface, an IEEE term  for the connection between
        a controller and the transceiver.

04.05Q: What is a transceiver?
     A: A  transceiver allows a station to transmit and receive to/from the
        common medium. In addition, Ethernet transceivers detect collisions
        on the medium and  provide  electrical isolation between  stations.
        10Base2 and 10Base5 transceivers  attach directly to the common bus
        media,  though the  former  usually  use  an  internal  transceiver
        built-onto the controller circuitry with a  "T" connector to access
        the  cable, while the latter use a  separate, external  transceiver
        and  an AUI (or  transceiver) cable  to connect to the  controller.
        10BaseF, 10BaseT and FOIRL also usually  use internal transceivers.
        Having  said  that,  there  also  also  external  transceivers  for
        10Base2, 10BaseF,  10BaseT and FOIRL that can connect externally to
        the controller's AUI port, either directly or via an AUI cable.

04.06Q: What means "MAU"?
     A: Medium  Access  Unit, an  IEEE term for a transceiver.  MAU is also
        commonly [mis]used  to describe  a Token-Ring  Multi-Station Access
        Unit (MSAU).  Refer to HUB for an explanation of MSAU.

04.07Q: What exactly does a repeater?
     A: A  repeater  acts  on a  purely  electrical  level  to  connect  to
        segments. All it does is amplify and reshape (and, depending on the
        type,  possibly  retime)  the  analog  waveform  to extend  network
        segment distances. It does  not  know anything about  addresses  or
        forwarding,  thus it cannot be used to reduce traffic  as a  bridge
        can in the example above.

04.08Q: What is a "hub"?
     A: A hub is a common wiring point for star-topology networks, and is a
        common synonym  for concentrator (though the latter  generally  has
        additional features or capabilities).  Arcnet, 10BaseT Ethernet and
        10BaseF Ethernet and many  proprietary network topologies  use hubs
        to connect multiple cable  runs in  a star-wired  network  topology
        into  a single  network.   Token-Ring MSAUs  (Multi-Station  Access
        Units) can  also  be considered a  type of  hub,  but  don't  let a
        token-ring  bigot hear  that.   Hubs have multiple ports  to attach
        the different  cable  runs.  Some  hubs (such as 10BaseT and active
        Arcnet)  include electronics to  regenerate and  retime  the signal
        between each hub port.  Others (such  as 10BaseF or passive Arcnet)
        simply  act as signal  splitters, similar to the multi-tap cable-TV
        splitters  you  might use on  your home  antenna coax  (of  course,
        10BaseF uses mirrors to split the  signals between cables).  Token-
        Ring  MSAUs  use relays (mechanical or  electronic) to reroute  the
        network signals  to each active  device in series, while  all other
        hubs  redistribute  received signals out  all ports simultaneously,
        just as a 10Base2 multi-port repeater would.
     
04.09Q: What exactly does a bridge?
     A: A bridge will connect to distinct segments  (usually referring to a
        physical length  of wire) and transmit traffic between  them.  This
        allows you to extend the  maximum size of  the network  while still
        not  breaking the maximum  wire  length,  attached device count, or
        number of repeaters for a network segment.

04.10Q: What does a "learning bridge"?  
     A: A  learning bridge monitors  MAC  (OSI layer  2) addresses  on both
        sides of its  connection and  attempts to learn which addresses are
        on which  side.   It  can  then decide when it  receives  a  packet
        whether it should cross the  bridge or stay local (some packets may
        not need to  cross the bridge  because the source  and  destination
        addresses are both on one side).   If  the bridge receives a packet
        that  it  doesn't  know  the addresses of, it  will  forward it  by
        default.

04.11Q: What is a remote bridge?
     A: A bridge  as described above that has an Ethernet  interface on one
        side and  a serial interface on  the other.   It would connect to a
        similar device on the other side of the serial line.  Most commonly
        used in WAN links where it is impossible or impractical to  install
        network  cables.  A high-speed  modem (or T1 DSU/CSU's, X.25 PAD's,
        etc)  and intervening telephone lines  or public data network would
        be used to connect the two remote bridges together.

04.13Q: Is there a maximum number of bridges allowed on a network?
     A: Per IEEE 802.1 (d), the maximum  number of concatenated brides in a
        bridged LAN is  7. This number is rather arbitrary, however, and is
        based on  simulations  of  application  performance  with  expected
        bridge delays.

        In  addition, the  number  assumes that  all bridges  are LOCAL (no
        remote WAN connections), and that the default Hold Time of 1 second
        is in place (this is  the time after which a bridge will discard  a
        frame  it is holding).  This  prevents  extra-late  frame delivery.
        (i.e, a frame should never be delivered more than  ~7 seconds after
        is it sent).

        I personally (Rich  Seifert) find  this  to  be  much  too long  an
        allowance. My "rule of thumb"  for  bridged LANs is  to  limit  the
        number of hops to  4, with not more than  one  of these being a WAN
        linked remote bridge.

04.13Q: What exactly does a router?  
     A: Routers work much like bridges, but they pay attention to the upper
        network layer protocols (OSI  layer  3) rather  than physical layer
        (OSI layer 1) protocols.  A router will decide whether to forward a
        packet by looking  at the  protocol level  addresses (for instance,
        TCP/IP addresses) rather  than  the MAC  address.   Because routers
        work at  layer 3  of  the OSI  stack,  it  is possible  for them to
        transfer packets between different media types (i.e., leased lines,
        Ethernet, token ring, X.25, Frame Relay  and FDDI).   Many  routers
        can also function as bridges.

04.14Q: So should I use a router or a bridge?
     A: There is no absolute answer to this.  Your network layout, type and
        amount of hosts and traffic, and other  issues (both  technical and
        non-technical)  must  be  considered.   Routing  would  always   be
        preferable to bridging except that  routers are slower  and usually
        more  expensive (due to the  amount of processing required  to look
        inside the  physical packet  and  determine  which  interface  that
        packet needs to  get  sent  out),  and that  many applications  use
        non-routable protocols (i.e., NetBIOS, DEC LAT, etc.).

        Rules of thumb:

           Bridges are usually good choices for small networks with few, if
           any, slow redundant links between destinations. Further, bridges
           may be your _only_ choice for certain protocols, unless you have
           the means to encapsulate (tunnel) the unroutable protocol inside
           a routable protocol.

           Routers are  usually much better  choices  for larger  networks,
           particularly  where  you  want to  have  a relatively clean  WAN
           backbone.   Routers are better  at  protecting against  protocol
           errors (such as  broadcast storms)  and  bandwidth  utilization.
           Since routers look  deeper inside the data packet, they can also
           make forwarding decisions based on the upper-layer protocols.

        Occasionally, a combination of the two devices are  the best way to
        go.   Bridges can  be  used  to  segment  small  networks that  are
        geographicly close to each other, between each other and the router
        to the rest of the WAN.

04.15Q: Are there problems mixing Bridging & routing?
     A: Only if you plan  on  having bridged links in  parallel with routed
        links.  You need to be very careful about running bridges providing
        links  in  parallel to a  router.   Bridges may  forward  broadcast
        requests which will confuse the  router there are lots of protocols
        you may not think of filtering  (e.g.  ARP,  Apple ARP  over  802.3
        etc.  etc.).  Also, DECnet routers have the same MAC address on all
        ports.  This will probably cause the  bridge to think it  is seeing
        an Ethernet loop.

04.16Q: Who makes the fastest/easiest/most advanced bridges or routers?
     A: The  IETF runs  bench  marks  on a  wide  selection  of bridges and
        routers.  The results (and  much of the testing itself) is  handled
        at  Harvard University by Scott Bradner.  [ed:  anyone have the ftp
        site address and path/filename for the benchmarks?]

04.17Q: What is a Kalpana EtherSwitch?  Are there other devices like it?
     A: A device that works sort of like a multisegment bridge, but with  a
        complicated  internal bus that allows full crosspoint switching.  A
        Kalpana  or  other such  switch is  exactly  equivalent to a  fully
        connected mess of simple bridges among  the  Ethernets.   A 12-port
        Kalpana or  similar switch is obviously  rather easier  to use  and
        cheaper than the equivalent mesh of  132 simple  bridges.  However,
        the  EtherSwitch does  not  use  the Spanning Tree  Algorithm  and,
        therefore, cannot be used in situations where a bridging loop might
        occur.

        There  are competing devices  from  other manufacturers,  including
        some that do implement  the  Spanning Tree Algorithm.  For example,
        Alantec has a multi-port bridge/router supporting  12 segments with
        full spanning tree and snmp and it runs at about ethernet speeds.

04.18Q: What is a driver?
     A: Typically the  software that allows  an Ethernet card in a computer
        to decode packets and send them to the  operating system and encode
        data  from  the operating  system for transmission by  the Ethernet
        card  through  the network.  By  handling the nitty-gritty hardware
        interface chores, it provides a device-independent interface to the
        upper layer  protocols,  thereby  making  them more  universal  and
        [allegedly]  easier  to develop  and  use.   There are  many  other
        meanings to  this word,  but this is probably what  you are looking
        for.

04.19Q: What is NDIS, packet driver, ODI.?
     A: NDIS is a Microsoft/3com puppy  that allows  "stacking" of multiple
        protocols for a single underlying driver.  Essentially it allows  a
        single Ethernet  card  in  a PC (it's  not limited to Ethernet)  to
        speak many  different network "languages",  and usually at the same
        time.

        A packet driver is another method of allowing multiple protocols to
        access the  network  interface at  the  same  time.  Developed  and
        supported by FTP Software  Inc, Clarkson  University, BYU and, more
        recently, Crynwr Software,  the packet driver spec (PDS) is used to
        provide   a   device   independent  interface  to   various  TCP/IP
        applications,  and  often in  combination  with  concurrent  Novell
        access (IPX/SPX).

        ODI  is  Novell   and  Apple's  equivalent   of  NDIS.   There  are
        differences between the two specs,  but not so  much as  to warrant
        description in this text.

        The next logical question is "which one should I use?"  There is no
        simple or obvious  answer, except that  you should use the one most
        commonly required by your software.


05.01Q: What means SQE? What is it for?
     A: SQE is the IEEE term for a collision. (Signal Quality Error)

05.02Q: What means SQE Test? What means heartbeat?  What are they for?
     A: SQE Test (a.k.a. heartbeat) is a means of detecting a transceiver's
        inability  to detect  collisions.   Without SQE  Test,  it  is  not
        possible to  determine if  your  collision  detector  is  operating
        properly.  SQE Test is implemented by generating  a test signal  on
        the  collision  pair  from  the  transceiver  (or  its  equivalent)
        following  every transmission on the network.  It does not generate
        any signal on the common medium.

        The problem with SQE  Test is  that it is not part of the  Ethernet
        Version  1.0 specification.  Therefore,  Version 1.0  equipment may
        not function  with transceiver that  generates the SQE Test signal.
        Additionally,  IEEE  802.3  specifications  state that  IEEE  802.3
        compliant  repeaters  must  not be attached  to  transceivers  that
        generate heartbeat.   (This  has  to  do with  a  jam  signal  that
        prevents  redundant collisions  from  occurring  on  the  network).
        Therefore, you must usually turn-off  SQE  Test (heartbeat) between
        the transceiver and an 802.3 repeater.

05.03Q: What means "IPG"?
     A: The  InterPacket Gap (more properly  referred to as  the InterFrame
        Gap,  or  IFG)  is  an  enforced  quiet  time  of  9.6  us  between
        transmitted Ethernet frames.

05.04Q: What means "promiscuous mode"?
     A: Promiscuous  mode is  a condition where the network interface  con-
        troller will pass all frames, regardless of destination address, up
        to   the  higher  level  network  layers.    Normally  the  network
        controller  will only  pass  up  frames  that  have  that  device's
        destination address.  However,  when put  in  promiscuous mode, all
        frames are passed on up the network stack regardless of destination
        address.   Promiscuous  mode is  usually used by network monitoring
        tools and transparent bridges (and, frequently, by network crackers
        trying to snatch passwords, or other data they're normally not able
        to see, off the wire).

05.05Q: What is a runt?
     A: A packet that is below the minimum size for a given protocol.  With
        Ethernet,  a runt is a frame shorter than the minimum  legal length
        of 60 bytes (at Data Link).

05.06Q: What causes a runt?
     A: Runt packets are most  likely  the  result of a collision, a faulty
        device on the network, or software gone awry.

05.07Q: What is a jabber?
     A: A blanket term for a device that is behaving improperly in terms of
        electrical signalling  on  a network. In Ethernet this is Very Bad,
        because Ethernet uses electrical signal levels to determine whether
        the network is available for transmission.  A jabbering device  can
        cause the entire network to halt because all other devices think it
        is busy.

05.08Q: What causes a jabber?
     A: Typically a bad network interface card in a machine on the network.
        In  bizarre  circumstances  outside  interference  might  cause it.
        These are very hard problems to trace with layman tools.

05.09Q: What is a collision?
     A: A condition where two devices  detect  that the network is idle and
        end up  trying to send packets at exactly the  same time. (within 1
        round-trip  delay) Since  only  one device  can transmit at a time,
        both devices must back off and attempt to retransmit again.

        The retransmission algorithm requires each device to wait  a random
        amount of  time,  so the two are very likely  to retry at different
        times, and thus the second  one will sense that the network is busy
        and  wait until the packet is finished. If the two devices retry at
        the same  time  (or almost the same  time) they will collide again,
        and the process repeats until  either the  packet finally  makes it
        onto the network without  collisions,  or 16 consecutive  collision
        occur and the packet is aborted.

05.10Q: What causes a collision?
     A: See above.  Ethernet is a CSMA/CD  (Carrier Sense Multiple  Access/
        Collision Detect) system. It  is possible to not sense carrier from
        a previous device and attempt  to transmit anyway, or  to  have two
        devices attempt to transmit at  the  same time;  in  either case  a
        collision  results.    Ethernet  is   particularly  susceptible  to
        performance loss from such  problems when people ignore the "rules"
        for wiring Ethernet.

05.11Q: How many collisions are too many?
     A: This  depends  on your application  and protocol.   In many  cases,
        collision rates of 50% will not cause a large decrease in perceived
        throughput.  If  your network is  slowing down and you  notice  the
        percentage of  collisions is  on  the  high  side, you may want try
        segmenting your network with either a bridge  or  router to see  if
        performance improves.

05.12Q: How do I reduce the number of collisions?
     A: Disconnect devices from  the  network.  Seriously, you need to cut-
        down on the number of devices on the network segment  to affect the
        collision  rate.  This is  usually  accomplished  by splitting  the
        segment into two  pieces and putting a bridge  or router in between
        them.

05.13Q: What is a late collision?
     A: A late collision occurs when two devices transmit at the same time,
        but due to cabling errors (most commonly, excessive network segment
        length or repeaters between  devices) neither detects  a collision.
        The reason this happens is because the time to propagate the signal
        from one end of the network to another is  longer than the time  to
        put the entire packet on the network, so the two devices that cause
        the late collision  never see that  the other's sending until after
        it  puts the  entire  packet on  the network.  Late  collisions are
        detected by the transmitter after the first  "slot time" of 64 byte
        times.  They  are only  detected  during  transmissions of  packets
        longer than 64 bytes.  It's detection is exactly  the same as for a
        normal collision; it just happens "too late."

        Typical causes  of late  collisions are  segment cable  lengths  in
        excess  of  the  maximum  permitted  for  the  cable  type,  faulty
        connectors  or  improper cabling,  excessive  numbers of  repeaters
        between  network devices,  and defective Ethernet  transceivers  or
        controllers.

        Another  bad thing about  late  collisions  is  that they occur for
        small packets also,  but cannot be detected by the transmitter.   A
        network  suffering a  measurable rate of late collisions (on  large
        packets)  is  also  suffering  lost   small  packets.   The  higher
        protocols do  not cope well with such losses.  Well, they cope, but
        at much  reduced speed.  A 1% packet  loss is enough  to reduce the
        speed of NFS by 90% with the default retransmission timers.  That's
        a 10X amplification of the problem.

        Finally, Ethernet  controllers  do not retransmit packets  lost  to
        late collisions.

05.14Q: What is a jam?
     A: When a workstation receives a collision, and it is transmitting, it
        puts out a jam so all other stations  will  see the collision also.
        When a repeater detects a collision on one port, it puts out  a jam
        on  all  other  ports, causing a collision to occur on  those lines
        that are transmitting, and causing any non-transmitting stations to
        wait to transmit.

05.15Q: What is a broadcast storm?
     A: An  overloaded  term that describes  an  overloaded  protocol. :-).
        Basically it describes a condition where devices on the network are
        generating traffic that by its nature causes the generation of even
        more  traffic.   The inevitable  result  is  a huge degradation  of
        performance or complete loss of the network as the devices continue
        to  generate  more and more  traffic.  This can  be related  to the
        physical transmission or to very high level protocols.  

05.16Q: How do I recognize a broadcast storm?
     A: That depends on what level  it  is occurring. Basically you have to
        be aware of the potential for  it beforehand and be looking for it,
        because in a true  broadcast storm you  will probably be  unable to
        access  the  network.   This can  change  dramatically for a higher
        level protocol.  NFS contention can result  in a  dramatic DROP  in
        Ethernet traffic, yet no one will have access to resources.

05.17Q: How can I prevent a broadcast storm?  
     A: Avoid protocols that are prone to it.  Route when it is practical.

05.18Q: What is an Alignment Error ?
     A: A received frame that does not contain  an integer number of octets
        and contains a frame check  sequence validation error.  A  frame in
        which the number of bits received is not an  integer  multiple of 8
        and  has a FCS (Frame Check Sequence) error.  (802.3 standard, page
        41)

05.19Q: What is *high* traffic on an Ethernet? 5%? 20%? 90%?
     A: High traffic is when things  start slowing down to the  point  they
        are  no  longer acceptable.  There is  not set percentage point, in
        other words.  Xerox used to use a formula based on packet size over
        time, or something, but the issue has been significantly muddied by
        the  plethora of  protocols available and how they  react  to  wire
        usage.   I  usually start  paying attention over 40-50%,  *or  when
        things slow down*. 


06.01Q: How can I test an Ethernet?
     A: This depends on what  level  you want to test.  The most basic test
        (a.k.a., "the fire  test") is to connect a pair  of devices to  the
        network  and see  if they can communicate  with each other.  If you
        want  to test  the  electrical integrity of the wire (i.e., will it
        carry  a signal properly), a TDR or cable scanner that incorporates
        TDR  and  other  functions, would  be  the most comprehensive  tool
        (though a great deal cab be determined with a simple ohmmeter).  If
        you   need  to  test   the  performance  or  troubleshoot  protocol
        transmission  problems, you will  need  special  and  usually  very
        expensive  software,  usually  coupled  with  custom  hardware,  to
        capture, optionally filter, and analyze the network packets.

06.02Q: Is there a troubleshooting guide for Ethernet?
     A: Yes, many.  I suggest you  check  your  local technical  bookstore.
        (Recommendations from the list would be appreciated!)

        There are also some common sense  steps  you can  take.  [Volunteer
        needed to fill this section out -- I think it's important but I'm a
        little short on time at the moment to do it myself -mm]

06.03Q: What is a "TDR"?
     A: A  Time-Domain Reflectometer is a tool used to detect cable faults.
        This device operates by sending a brief signal pulse down the cable
        and looking for its  reflection to bounce back.  By  analyzing  the
        reflected pulse, it is possible to make judgments about the quality
        of  the cable segment.  More advanced units can not only detect and
        identify the nature of the problem, but give a  reasonably accurate
        indication of  the problem's location (distance  from the  point of
        the test).  There  is  also a device known as an OTDR, which is  an
        Optical Time-Domain Reflectometer for fiber-optic cables.

06.04Q: What means "BERT"?
     A: Bit Error  Rate Tester.  This  equipment  is  used  to  analyze the
        amount and types of errors that occur on a cable segment.

06.05Q: What (free) tools are there to monitor/decode/etc an Ethernet?
     A: There are many built into most Unix systems.  For example, the ping
        command can be used to determine if a given host is alive, and will
        also tell you the round trip transmission time.  ifconfig will tell
        you the status of the network  interfaces.  netstat will  summarize
        statistics  for  network usage.  spray will  allow  you to generate
        network  traffic  directed   at  a  particular   host.   Use   "man
        command-name" to  learn  more about a unix command.   Using "man -k
        network" may also provide leads to the tools provided by your  unix
        vendor.

        Many  more public domain  tools  are  available  for  unix systems.
        These include:
           traffic:    allows systems to graphically display network load
           tcpdump:    collect statistics and display individual packets
           etherfind:  ????
           nfswatch:   summarize/display traffic, particularly nfs packets
           traceroute: determine the route between two hosts

        Some cards for the PC come with utilities.  There are several  free
        ones available,  including  ping (Clarkson University  and others),
        The Beholder (packet capture and display) and others.


07.01Q: Are there any other sources of information about Ethernet?
     A: There  are  a LOT of information sources.   Try  to get the BIG-LAN
        FAQ.   One known  anonymous  FTP location is icarus.cns.syr.edu  in
        /information/big-lan.   The big-lan.faq  file is a kind of superset
        to this ethernet faq.   Another excelleny  document is the  network
        reading   list,  "net-read.txt"   (or   "net-read.ps")  by  Charles
        Spurgeon, available  via  anonymous FTP from ftp.utexas.edu.  Cisco
        Systems has a useful document: DOC-GLOSS part number 78-0888-01.


07.02Q: What books are good about Ethernet LAN's?
     A: The IEEE 802.3 documents are considered the definitative source for
        information on  Ethernet.   However, these may  not be suitable for
        all  levels  of  users.  Surprisingly,  there  are few  good  books
        specifically dealing with  Ethernet LANs,  but  here are a few that
        you might find useful:

            Local Area Networks, An introduction to the technology
            by John E. McNamara, published by Digital Press, 1985
            165 pps. with index and glossary, $29.00
            ISBN 0-932376-79-7,  Digital Press part number EY-00051-DP.

            Network Troubleshooting Guide
            by Digital Equipment Corporation, August 1990
            Approx. 278 pps. with index and glossary, $95.00
            Digital Press part number EK-339AB-GD-002.

        These books and others are recommended in the network reading list,
        net-read.txt, from ftp.utexas.edu.

07.03Q: Where can I get IEEE802.x docs online?
     A: Nowhere.  IEEE documents must be ordered  from the IEEE themselves.
        You can contact them at:

          Institute of Electrical and Electronic Engineers
          445 Hoes Lane
          P.O. Box 1331
          Piscataway, NJ 08855-1331
          U.S.A.
          (800) 678-IEEE

        You can also get order information via e-mail to askieee@ieee.org.

07.04Q: Where can I get EIA/TIA docs online?
     A: Nowhere.  They must be ordered from:

          Global Engineering
          800-854-7179

        (I am still trying to contact this vendor for more details.)

07.05Q: Where can I find the specifications of Ethernet equipment?
     A: From the  manufacturer of  the product [hopefully!].   In the  IEEE
        802.3 documents for standard devices.

07.06Q: Where can I find IETF (Internet Engineering Task Force) documents?
     A: These are available for anonymous FTP  from a number of sites.  The
        cannonical location is ietf.cnri.reston.va.us in /ietf. Drafts are
        at the same site in /internet-drafts.

07.07Q: Where can I get the current version of this document?
     A: Check  in  newsgroups  comp.dcom.lans.ethernet,   comp.answers  and
        news.answers.   It  is   also  available  via  anonymous  ftp  from
        steph.admin.umass.edu in path pub/faqs as ethernet.faq.
-- 
Marc A. Runkel                              marc.runkel@registrar.umass.edu
Network Analyst                             Of course, this is just my
Registrar's Office * Systems Support Group  tiny, insignificant, humble
University of Massachusetts, Amherst        opinion.  If you don't like it....